default search action
Yanguo Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Zhibin Wang, Jiangtao Cui, Xiyue Gao, Hui Li, Yanguo Peng, Zhuang Liu, Hui Zhang, Kankan Zhao:
Quartet: A Query Aware Database Adaptive Compilation Decision System. Expert Syst. Appl. 244: 122841 (2024) - [j17]Wenjie Ma, Yanguo Peng, Ximeng Liu, Jiangtao Cui:
VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for IoT Environment. IEEE Internet Things J. 11(2): 3068-3081 (2024) - [i2]Shuo Yang, Jiadong Xie, Yingfan Liu, Jeffrey Xu Yu, Xiyue Gao, Qianru Wang, Yanguo Peng, Jiangtao Cui:
Revisiting the Index Construction of Proximity Graph-Based Approximate Nearest Neighbor Search. CoRR abs/2410.01231 (2024) - 2023
- [j16]Yuchao Wang, Yanguo Peng, Ximeng Liu, Zuobin Ying, Jiangtao Cui, Dongyao Niu, Xiaofang Xia:
aChain: A SQL-Empowered Analytical Blockchain as a Database. IEEE Trans. Computers 72(11): 3099-3112 (2023) - [j15]Zhen Lv, Kaiyu Shang, Hongwei Huo, Ximeng Liu, Yanguo Peng, Xiangyu Wang, Yaorong Tan:
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data. IEEE Trans. Serv. Comput. 16(5): 3621-3635 (2023) - [c5]Yanguo Peng, Rongqiao Liu, Xiyue Gao, Luyuan Huang, Jingjing Guo, Yaofeng Tu:
SecCT: Secure and scalable count query models on encrypted genomic data. PRDC 2023: 13-22 - 2022
- [j14]Xiaofang Xia, Jian Lin, Yang Xiao, Jiangtao Cui, Yanguo Peng, Yong Ma:
A Control-Chart-Based Detector for Small-Amount Electricity Theft (SET) Attack in Smart Grids. IEEE Internet Things J. 9(9): 6745-6762 (2022) - [j13]Xiaofang Xia, Yang Liu, Yang Xiao, Jiangtao Cui, Bo Yang, Yanguo Peng:
AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening Against COVID-19. IEEE Trans Autom. Sci. Eng. 19(2): 646-662 (2022) - [j12]Yanguo Peng, Long Wang, Jiangtao Cui, Ximeng Liu, Hui Li, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. IEEE Trans. Dependable Secur. Comput. 19(1): 388-401 (2022) - [j11]Jingjing Guo, Haiyang Li, Feiran Huang, Zhiquan Liu, Yanguo Peng, Xinghua Li, Jianfeng Ma, Varun G. Menon, Konstantin Kostromitin Igorevich:
ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning. IEEE Trans. Ind. Informatics 18(10): 6526-6536 (2022) - [c4]Longlong Sun, Hui Li, Yanguo Peng, Jiangtao Cui:
Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks. CIKM 2022: 1837-1847 - [c3]Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui:
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. ISC 2022: 422-442 - 2021
- [j10]Jiale Zhao, Yong Ma, Jiangtao Cui, Yanguo Peng, Kangshun Li, Tengyu Wang:
SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy. IEEE Access 9: 5690-5703 (2021) - [j9]Bing He, Jun Liu, Tengfei Yang, Bin Xiao, Yanguo Peng:
Quaternion fractional-order color orthogonal moment-based image representation and recognition. EURASIP J. Image Video Process. 2021(1): 17 (2021) - [j8]Yixiao Zhu, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng, Jianting Ning:
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing. Secur. Commun. Networks 2021: 5514137:1-5514137:18 (2021) - 2020
- [j7]Bing He, Jiangtao Cui, Yanguo Peng, Tengfei Yang:
Image analysis by fast improved radial harmonic-Fourier moments algorithm. Int. J. Imaging Syst. Technol. 30(4): 1033-1045 (2020) - [c2]Weiguo Wang, Hui Li, Yanguo Peng, Sourav S. Bhowmick, Peng Chen, Xiaofeng Chen, Jiangtao Cui:
SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud. DASFAA (3) 2020: 288-305 - [i1]Weiguo Wang, Hui Li, Yanguo Peng, Sourav S. Bhowmick, Peng Chen, Xiaofeng Chen, Jiangtao Cui:
An Efficient Secure Dynamic Skyline Query Model. CoRR abs/2002.07511 (2020)
2010 – 2019
- 2019
- [j6]Bing He, Jiangtao Cui, Bin Xiao, Yanguo Peng:
Image analysis using modified exponent-Fourier moments. EURASIP J. Image Video Process. 2019: 72 (2019) - 2018
- [j5]Yanguo Peng, Hui Li, Jiangtao Cui, Jianfeng Ma, Yingfan Liu:
Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data. IEEE Access 6: 23137-23151 (2018) - [j4]Wenzhuo Xue, Hui Li, Yanguo Peng, Jiangtao Cui, Yu Shi:
Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments. IEEE Trans. Big Data 4(4): 586-599 (2018) - [j3]Zhen Lv, Changgen Peng, Yanguo Peng, Junwei Zhang:
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 9437936:1-9437936:13 (2018) - 2017
- [j2]Yanguo Peng, Hui Li, Jiangtao Cui, Junwei Zhang, Jianfeng Ma, Changgen Peng:
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6): 62101 (2017) - [j1]Yanguo Peng, Jiangtao Cui, Hui Li, Jianfeng Ma:
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Inf. Sci. 387: 146-164 (2017) - 2016
- [c1]Yanguo Peng, Hui Li, Jiangtao Cui, Yixiao Zhu, Changgen Peng:
An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree. NaNA 2016: 250-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint